jimmydzj2006 commited on
Commit
63ea6db
1 Parent(s): eb8018a

Add new SentenceTransformer model

Browse files
1_Pooling/config.json ADDED
@@ -0,0 +1,10 @@
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "word_embedding_dimension": 384,
3
+ "pooling_mode_cls_token": true,
4
+ "pooling_mode_mean_tokens": false,
5
+ "pooling_mode_max_tokens": false,
6
+ "pooling_mode_mean_sqrt_len_tokens": false,
7
+ "pooling_mode_weightedmean_tokens": false,
8
+ "pooling_mode_lasttoken": false,
9
+ "include_prompt": true
10
+ }
README.md ADDED
@@ -0,0 +1,843 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ base_model: Snowflake/snowflake-arctic-embed-xs
3
+ library_name: sentence-transformers
4
+ metrics:
5
+ - cosine_accuracy@1
6
+ - cosine_accuracy@3
7
+ - cosine_accuracy@5
8
+ - cosine_accuracy@10
9
+ - cosine_precision@1
10
+ - cosine_precision@3
11
+ - cosine_precision@5
12
+ - cosine_precision@10
13
+ - cosine_recall@1
14
+ - cosine_recall@3
15
+ - cosine_recall@5
16
+ - cosine_recall@10
17
+ - cosine_ndcg@10
18
+ - cosine_mrr@10
19
+ - cosine_map@100
20
+ - dot_accuracy@1
21
+ - dot_accuracy@3
22
+ - dot_accuracy@5
23
+ - dot_accuracy@10
24
+ - dot_precision@1
25
+ - dot_precision@3
26
+ - dot_precision@5
27
+ - dot_precision@10
28
+ - dot_recall@1
29
+ - dot_recall@3
30
+ - dot_recall@5
31
+ - dot_recall@10
32
+ - dot_ndcg@10
33
+ - dot_mrr@10
34
+ - dot_map@100
35
+ pipeline_tag: sentence-similarity
36
+ tags:
37
+ - sentence-transformers
38
+ - sentence-similarity
39
+ - feature-extraction
40
+ - generated_from_trainer
41
+ - dataset_size:2730
42
+ - loss:MatryoshkaLoss
43
+ - loss:MultipleNegativesRankingLoss
44
+ widget:
45
+ - source_sentence: What steps can be taken to mitigate the risks associated with GAI
46
+ systems?
47
+ sentences:
48
+ - 'Action ID: GV-4.3-003
49
+
50
+ Suggested Action: Verify information sharing and feedback mechanisms among individuals
51
+ and
52
+
53
+ organizations regarding any negative impact from GAI systems.
54
+
55
+ GAI Risks: Information Integrity; Data
56
+
57
+ Privacy'
58
+ - '48. The definitions of ''equity'' and ''underserved communities'' can be found
59
+ in the Definitions section of this framework as well as in Section 2 of The Executive
60
+ Order On Advancing Racial Equity and Support [for Underserved Communities Through
61
+ the Federal Government. https://www.whitehouse.gov/](https://www.whitehouse.gov)
62
+ briefing-room/presidential-actions/2021/01/20/executive-order-advancing-racial-equity-and-support­
63
+ for-underserved-communities-through-the-federal-government/
64
+
65
+
66
+ 49. Id.'
67
+ - 'Action ID: GV-6.1-001
68
+
69
+ Suggested Action: Categorize different types of GAI content with associated third-party
70
+ rights (e.g.,
71
+
72
+ copyright, intellectual property, data privacy).
73
+
74
+ GAI Risks: Data Privacy; Intellectual
75
+
76
+ Property; Value Chain and
77
+
78
+ Component Integration'
79
+ - source_sentence: What tasks are associated with AI Actor governance and oversight?
80
+ sentences:
81
+ - 'GOVERN 1.1: Legal and regulatory requirements involving AI are understood, managed,
82
+ and documented.: MANAGE 4.2: Measurable activities for continual improvements
83
+ are integrated into AI system updates and include regular
84
+
85
+ engagement with interested parties, including relevant AI Actors.
86
+
87
+ AI Actor Tasks: Governance and Oversight: AI Actor Tasks: AI Deployment, AI Design,
88
+ AI Development, Affected Individuals and Communities, End-Users, Operation and
89
+
90
+ Monitoring, TEVV'
91
+ - "Beyond harms from information exposure (such as extortion or dignitary harm),\
92
+ \ wrong or inappropriate inferences of PII can contribute to downstream or secondary\
93
+ \ harmful impacts. For example, predictive inferences made by GAI models based\
94
+ \ on PII or protected attributes can contribute to adverse decisions, leading\
95
+ \ to representational or allocative harms to individuals or groups (see Harmful\
96
+ \ Bias and Homogenization below). #### Trustworthy AI Characteristics: Accountable\
97
+ \ and Transparent, Privacy Enhanced, Safe, Secure and Resilient\n\n 2.5. Environmental\
98
+ \ Impacts\n\n Training, maintaining, and operating (running inference on) GAI\
99
+ \ systems are resource-intensive activities, with potentially large energy and\
100
+ \ environmental footprints. Energy and carbon emissions vary based on what is\
101
+ \ being done with the GAI model (i.e., pre-training, fine-tuning, inference),\
102
+ \ the modality of the content, hardware used, and type of task or application.\n\
103
+ \n Current estimates suggest that training a single transformer LLM can emit as\
104
+ \ much carbon as 300 round- trip flights between San Francisco and New York. In\
105
+ \ a study comparing energy consumption and carbon emissions for LLM inference,\
106
+ \ generative tasks (e.g., text summarization) were found to be more energy- and\
107
+ \ carbon-intensive than discriminative or non-generative tasks (e.g., text classification).\
108
+ \ \n\n Methods for creating smaller versions of trained models, such as model\
109
+ \ distillation or compression, could reduce environmental impacts at inference\
110
+ \ time, but training and tuning such models may still contribute to their environmental\
111
+ \ impacts. Currently there is no agreed upon method to estimate environmental\
112
+ \ impacts from GAI. \n\n Trustworthy AI Characteristics: Accountable and Transparent,\
113
+ \ Safe\n\n 2.6. Harmful Bias and Homogenization"
114
+ - "#### • Accessibility and reasonable accommodations\n\n • AI actor credentials\
115
+ \ and qualifications • Alignment to organizational values\n\n#### • Auditing\
116
+ \ and assessment • Change-management controls • Commercial use • Data provenance\
117
+ \ #### • Data protection • Data retention • Consistency in use of defining key\
118
+ \ terms • Decommissioning • Discouraging anonymous use • Education • Impact\
119
+ \ assessments • Incident response • Monitoring • Opt-outs\n\n#### • Risk-based\
120
+ \ controls • Risk mapping and measurement • Science-backed TEVV practices •\
121
+ \ Secure software development practices • Stakeholder engagement • Synthetic\
122
+ \ content detection and labeling tools and techniques\n\n • Whistleblower protections\
123
+ \ • Workforce diversity and interdisciplinary teams\n\n#### Establishing acceptable\
124
+ \ use policies and guidance for the use of GAI in formal human-AI teaming settings\
125
+ \ as well as different levels of human-AI configurations can help to decrease\
126
+ \ risks arising from misuse, abuse, inappropriate repurpose, and misalignment\
127
+ \ between systems and users. These practices are just one example of adapting\
128
+ \ existing governance protocols for GAI contexts. \n\n A.1.3. Third-Party Considerations\n\
129
+ \n Organizations may seek to acquire, embed, incorporate, or use open-source or\
130
+ \ proprietary third-party GAI models, systems, or generated data for various applications\
131
+ \ across an enterprise. Use of these GAI tools and inputs has implications for\
132
+ \ all functions of the organization – including but not limited to acquisition,\
133
+ \ human resources, legal, compliance, and IT services – regardless of whether\
134
+ \ they are carried out by employees or third parties. Many of the actions cited\
135
+ \ above are relevant and options for addressing third-party considerations."
136
+ - source_sentence: What specific topic is covered in Chapter 3 of the AI Risk Management
137
+ Framework by NIST?
138
+ sentences:
139
+ - "Liang, W. et al. (2023) GPT detectors are biased against non-native English writers.\
140
+ \ arXiv. https://arxiv.org/abs/2304.02819\n\n Luccioni, A. et al. (2023) Power\
141
+ \ Hungry Processing: Watts Driving the Cost of AI Deployment? arXiv. https://arxiv.org/pdf/2311.16863\n\
142
+ \n Mouton, C. et al. (2024) The Operational Risks of AI in Large-Scale Biological\
143
+ \ Attacks. RAND. https://www.rand.org/pubs/research_reports/RRA2977-2.html.\n\n\
144
+ \ Nicoletti, L. et al. (2023) Humans Are Biased. Generative Ai Is Even Worse.\
145
+ \ Bloomberg. https://www.bloomberg.com/graphics/2023-generative-ai-bias/.\n\n\
146
+ \ National Institute of Standards and Technology (2024) Adversarial Machine Learning:\
147
+ \ A Taxonomy and Terminology of Attacks and Mitigations https://csrc.nist.gov/pubs/ai/100/2/e2023/final\n\
148
+ \n National Institute of Standards and Technology (2023) AI Risk Management Framework.\
149
+ \ https://www.nist.gov/itl/ai-risk-management-framework\n\n National Institute\
150
+ \ of Standards and Technology (2023) AI Risk Management Framework, Chapter 3:\
151
+ \ AI Risks and Trustworthiness. https://airc.nist.gov/AI_RMF_Knowledge_Base/AI_RMF/Foundational_Information/3-sec-characteristics\n\
152
+ \n National Institute of Standards and Technology (2023) AI Risk Management Framework,\
153
+ \ Chapter 6: AI RMF Profiles. https://airc.nist.gov/AI_RMF_Knowledge_Base/AI_RMF/Core_And_Profiles/6-sec-profile"
154
+ - "###### WHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS\n\n The expectations for\
155
+ \ automated systems are meant to serve as a blueprint for the development of additional\
156
+ \ technical standards and practices that are tailored for particular sectors and\
157
+ \ contexts.\n\n**Equitable.** Consideration should be given to ensuring outcomes\
158
+ \ of the fallback and escalation system are equitable when compared to those of\
159
+ \ the automated system and such that the fallback and escalation system provides\
160
+ \ equitable access to underserved communities.[105]\n\n**Timely. Human consideration\
161
+ \ and fallback are only useful if they are conducted and concluded in a** timely\
162
+ \ manner. The determination of what is timely should be made relative to the specific\
163
+ \ automated system, and the review system should be staffed and regularly assessed\
164
+ \ to ensure it is providing timely consideration and fallback. In time-critical\
165
+ \ systems, this mechanism should be immediately available or, where possible,\
166
+ \ available before the harm occurs. Time-critical systems include, but are not\
167
+ \ limited to, voting-related systems, automated building access and other access\
168
+ \ systems, systems that form a critical component of healthcare, and systems that\
169
+ \ have the ability to withhold wages or otherwise cause immediate financial penalties.\n\
170
+ \n**Effective.** The organizational structure surrounding processes for consideration\
171
+ \ and fallback should be designed so that if the human decision-maker charged\
172
+ \ with reassessing a decision determines that it should be overruled, the new\
173
+ \ decision will be effectively enacted. This includes ensuring that the new decision\
174
+ \ is entered into the automated system throughout its components, any previous\
175
+ \ repercussions from the old decision are also overturned, and safeguards are\
176
+ \ put in place to help ensure that future decisions do not result in the same\
177
+ \ errors.\n\n**Maintained. The human consideration and fallback process and any\
178
+ \ associated automated processes** should be maintained and supported as long\
179
+ \ as the relevant automated system continues to be in use.\n\n**Institute training,\
180
+ \ assessment, and oversight to combat automation bias and ensure any** **human-based\
181
+ \ components of a system are effective.**"
182
+ - "**Institute training, assessment, and oversight to combat automation bias and\
183
+ \ ensure any** **human-based components of a system are effective.**\n\n**Training\
184
+ \ and assessment. Anyone administering, interacting with, or interpreting the\
185
+ \ outputs of an auto­** mated system should receive training in that system, including\
186
+ \ how to properly interpret outputs of a system in light of its intended purpose\
187
+ \ and in how to mitigate the effects of automation bias. The training should reoc­\
188
+ \ cur regularly to ensure it is up to date with the system and to ensure the system\
189
+ \ is used appropriately. Assess­ ment should be ongoing to ensure that the use\
190
+ \ of the system with human involvement provides for appropri­ ate results, i.e.,\
191
+ \ that the involvement of people does not invalidate the system's assessment as\
192
+ \ safe and effective or lead to algorithmic discrimination.\n\n**Oversight. Human-based\
193
+ \ systems have the potential for bias, including automation bias, as well as other**\
194
+ \ concerns that may limit their effectiveness. The results of assessments of the\
195
+ \ efficacy and potential bias of such human-based systems should be overseen by\
196
+ \ governance structures that have the potential to update the operation of the\
197
+ \ human-based system in order to mitigate these effects. **HUMAN ALTERNATIVES,**\
198
+ \ **CONSIDERATION, AND** **FALLBACK**\n\n###### WHAT SHOULD BE EXPECTED OF AUTOMATED\
199
+ \ SYSTEMS\n\n The expectations for automated systems are meant to serve as a blueprint\
200
+ \ for the development of additional technical standards and practices that are\
201
+ \ tailored for particular sectors and contexts.\n\n**Implement additional human\
202
+ \ oversight and safeguards for automated systems related to** **sensitive domains**\n\
203
+ \nAutomated systems used within sensitive domains, including criminal justice,\
204
+ \ employment, education, and health, should meet the expectations laid out throughout\
205
+ \ this framework, especially avoiding capricious, inappropriate, and discriminatory\
206
+ \ impacts of these technologies. Additionally, automated systems used within sensitive\
207
+ \ domains should meet these expectations:"
208
+ - source_sentence: What is the primary goal of protecting the public from algorithmic
209
+ discrimination?
210
+ sentences:
211
+ - 'Action ID: MS-1.3-001
212
+
213
+ Suggested Action: Define relevant groups of interest (e.g., demographic groups,
214
+ subject matter
215
+
216
+ experts, experience with GAI technology) within the context of use as part of
217
+
218
+ plans for gathering structured public feedback.
219
+
220
+ GAI Risks: Human-AI Configuration; Harmful
221
+
222
+ Bias and Homogenization; CBRN
223
+
224
+ Information or Capabilities'
225
+ - 'Action ID: GV-6.1-001
226
+
227
+ Suggested Action: Categorize different types of GAI content with associated third-party
228
+ rights (e.g.,
229
+
230
+ copyright, intellectual property, data privacy).
231
+
232
+ GAI Risks: Data Privacy; Intellectual
233
+
234
+ Property; Value Chain and
235
+
236
+ Component Integration'
237
+ - '**Protect the public from algorithmic discrimination in a proactive and ongoing
238
+ manner**
239
+
240
+
241
+ **Proactive assessment of equity in design. Those responsible for the development,
242
+ use, or oversight of** automated systems should conduct proactive equity assessments
243
+ in the design phase of the technology research and development or during its acquisition
244
+ to review potential input data, associated historical context, accessibility for
245
+ people with disabilities, and societal goals to identify potential discrimination
246
+ and effects on equity resulting from the introduction of the technology. The assessed
247
+ groups should be as inclusive as possible of the underserved communities mentioned
248
+ in the equity definition: Black, Latino, and Indigenous and Native American persons,
249
+ Asian Americans and Pacific Islanders and other persons of color; members of religious
250
+ minorities; women, girls, and non-binary people; lesbian, gay, bisexual, transgender,
251
+ queer, and intersex (LGBTQI+) persons; older adults; persons with disabilities;
252
+ persons who live in rural areas; and persons otherwise adversely affected by persistent
253
+ poverty or inequality. Assessment could include both qualitative and quantitative
254
+ evaluations of the system. This equity assessment should also be considered a
255
+ core part of the goals of the consultation conducted as part of the safety and
256
+ efficacy review.
257
+
258
+
259
+ **Representative and robust data. Any data used as part of system development
260
+ or assessment should be** representative of local communities based on the planned
261
+ deployment setting and should be reviewed for bias based on the historical and
262
+ societal context of the data. Such data should be sufficiently robust to identify
263
+ and help to mitigate biases and potential harms.'
264
+ - source_sentence: How can human subjects revoke their consent according to the suggested
265
+ action?
266
+ sentences:
267
+ - "Disinformation and misinformation – both of which may be facilitated by GAI –\
268
+ \ may erode public trust in true or valid evidence and information, with downstream\
269
+ \ effects. For example, a synthetic image of a Pentagon blast went viral and briefly\
270
+ \ caused a drop in the stock market. Generative AI models can also assist malicious\
271
+ \ actors in creating compelling imagery and propaganda to support disinformation\
272
+ \ campaigns, which may not be photorealistic, but could enable these campaigns\
273
+ \ to gain more reach and engagement on social media platforms. Additionally, generative\
274
+ \ AI models can assist malicious actors in creating fraudulent content intended\
275
+ \ to impersonate others.\n\n Trustworthy AI Characteristics: Accountable and Transparent,\
276
+ \ Safe, Valid and Reliable, Interpretable and Explainable\n\n 2.9. Information\
277
+ \ Security\n\n Information security for computer systems and data is a mature\
278
+ \ field with widely accepted and standardized practices for offensive and defensive\
279
+ \ cyber capabilities. GAI-based systems present two primary information security\
280
+ \ risks: GAI could potentially discover or enable new cybersecurity risks by lowering\
281
+ \ the barriers for or easing automated exercise of offensive capabilities; simultaneously,\
282
+ \ it expands the available attack surface, as GAI itself is vulnerable to attacks\
283
+ \ like prompt injection or data poisoning. \n\n Offensive cyber capabilities advanced\
284
+ \ by GAI systems may augment cybersecurity attacks such as hacking, malware, and\
285
+ \ phishing. Reports have indicated that LLMs are already able to discover some\
286
+ \ vulnerabilities in systems (hardware, software, data) and write code to exploit\
287
+ \ them. Sophisticated threat actors might further these risks by developing GAI-powered\
288
+ \ security co-pilots for use in several parts of the attack chain, including informing\
289
+ \ attackers on how to proactively evade threat detection and escalate privileges\
290
+ \ after gaining system access.\n\n Information security for GAI models and systems\
291
+ \ also includes maintaining availability of the GAI system and the integrity and\
292
+ \ (when applicable) the confidentiality of the GAI code, training data, and model\
293
+ \ weights. To identify and secure potential attack points in AI systems or specific\
294
+ \ components of the AI"
295
+ - 'Action ID: GV-4.2-003
296
+
297
+ Suggested Action: Verify that downstream GAI system impacts (such as the use of
298
+ third-party
299
+
300
+ plugins) are included in the impact documentation process.
301
+
302
+ GAI Risks: Value Chain and Component
303
+
304
+ Integration'
305
+ - 'Action ID: MS-2.2-003
306
+
307
+ Suggested Action: Provide human subjects with options to withdraw participation
308
+ or revoke their
309
+
310
+ consent for present or future use of their data in GAI applications.
311
+
312
+ GAI Risks: Data Privacy; Human-AI
313
+
314
+ Configuration; Information
315
+
316
+ Integrity'
317
+ model-index:
318
+ - name: SentenceTransformer based on Snowflake/snowflake-arctic-embed-xs
319
+ results:
320
+ - task:
321
+ type: information-retrieval
322
+ name: Information Retrieval
323
+ dataset:
324
+ name: Unknown
325
+ type: unknown
326
+ metrics:
327
+ - type: cosine_accuracy@1
328
+ value: 0.6483516483516484
329
+ name: Cosine Accuracy@1
330
+ - type: cosine_accuracy@3
331
+ value: 0.7362637362637363
332
+ name: Cosine Accuracy@3
333
+ - type: cosine_accuracy@5
334
+ value: 0.7802197802197802
335
+ name: Cosine Accuracy@5
336
+ - type: cosine_accuracy@10
337
+ value: 0.8571428571428571
338
+ name: Cosine Accuracy@10
339
+ - type: cosine_precision@1
340
+ value: 0.6483516483516484
341
+ name: Cosine Precision@1
342
+ - type: cosine_precision@3
343
+ value: 0.2454212454212454
344
+ name: Cosine Precision@3
345
+ - type: cosine_precision@5
346
+ value: 0.15604395604395602
347
+ name: Cosine Precision@5
348
+ - type: cosine_precision@10
349
+ value: 0.0857142857142857
350
+ name: Cosine Precision@10
351
+ - type: cosine_recall@1
352
+ value: 0.6483516483516484
353
+ name: Cosine Recall@1
354
+ - type: cosine_recall@3
355
+ value: 0.7362637362637363
356
+ name: Cosine Recall@3
357
+ - type: cosine_recall@5
358
+ value: 0.7802197802197802
359
+ name: Cosine Recall@5
360
+ - type: cosine_recall@10
361
+ value: 0.8571428571428571
362
+ name: Cosine Recall@10
363
+ - type: cosine_ndcg@10
364
+ value: 0.7433871430365133
365
+ name: Cosine Ndcg@10
366
+ - type: cosine_mrr@10
367
+ value: 0.7083235217163788
368
+ name: Cosine Mrr@10
369
+ - type: cosine_map@100
370
+ value: 0.71581044355863
371
+ name: Cosine Map@100
372
+ - type: dot_accuracy@1
373
+ value: 0.6483516483516484
374
+ name: Dot Accuracy@1
375
+ - type: dot_accuracy@3
376
+ value: 0.7362637362637363
377
+ name: Dot Accuracy@3
378
+ - type: dot_accuracy@5
379
+ value: 0.7802197802197802
380
+ name: Dot Accuracy@5
381
+ - type: dot_accuracy@10
382
+ value: 0.8571428571428571
383
+ name: Dot Accuracy@10
384
+ - type: dot_precision@1
385
+ value: 0.6483516483516484
386
+ name: Dot Precision@1
387
+ - type: dot_precision@3
388
+ value: 0.2454212454212454
389
+ name: Dot Precision@3
390
+ - type: dot_precision@5
391
+ value: 0.15604395604395602
392
+ name: Dot Precision@5
393
+ - type: dot_precision@10
394
+ value: 0.0857142857142857
395
+ name: Dot Precision@10
396
+ - type: dot_recall@1
397
+ value: 0.6483516483516484
398
+ name: Dot Recall@1
399
+ - type: dot_recall@3
400
+ value: 0.7362637362637363
401
+ name: Dot Recall@3
402
+ - type: dot_recall@5
403
+ value: 0.7802197802197802
404
+ name: Dot Recall@5
405
+ - type: dot_recall@10
406
+ value: 0.8571428571428571
407
+ name: Dot Recall@10
408
+ - type: dot_ndcg@10
409
+ value: 0.7433871430365133
410
+ name: Dot Ndcg@10
411
+ - type: dot_mrr@10
412
+ value: 0.7083235217163788
413
+ name: Dot Mrr@10
414
+ - type: dot_map@100
415
+ value: 0.71581044355863
416
+ name: Dot Map@100
417
+ ---
418
+
419
+ # SentenceTransformer based on Snowflake/snowflake-arctic-embed-xs
420
+
421
+ This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [Snowflake/snowflake-arctic-embed-xs](https://huggingface.co/Snowflake/snowflake-arctic-embed-xs). It maps sentences & paragraphs to a 384-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.
422
+
423
+ ## Model Details
424
+
425
+ ### Model Description
426
+ - **Model Type:** Sentence Transformer
427
+ - **Base model:** [Snowflake/snowflake-arctic-embed-xs](https://huggingface.co/Snowflake/snowflake-arctic-embed-xs) <!-- at revision 742da4f66e1823b5b4dbe6c320a1375a1fd85f9e -->
428
+ - **Maximum Sequence Length:** 512 tokens
429
+ - **Output Dimensionality:** 384 tokens
430
+ - **Similarity Function:** Cosine Similarity
431
+ <!-- - **Training Dataset:** Unknown -->
432
+ <!-- - **Language:** Unknown -->
433
+ <!-- - **License:** Unknown -->
434
+
435
+ ### Model Sources
436
+
437
+ - **Documentation:** [Sentence Transformers Documentation](https://sbert.net)
438
+ - **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers)
439
+ - **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co/models?library=sentence-transformers)
440
+
441
+ ### Full Model Architecture
442
+
443
+ ```
444
+ SentenceTransformer(
445
+ (0): Transformer({'max_seq_length': 512, 'do_lower_case': False}) with Transformer model: BertModel
446
+ (1): Pooling({'word_embedding_dimension': 384, 'pooling_mode_cls_token': True, 'pooling_mode_mean_tokens': False, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
447
+ (2): Normalize()
448
+ )
449
+ ```
450
+
451
+ ## Usage
452
+
453
+ ### Direct Usage (Sentence Transformers)
454
+
455
+ First install the Sentence Transformers library:
456
+
457
+ ```bash
458
+ pip install -U sentence-transformers
459
+ ```
460
+
461
+ Then you can load this model and run inference.
462
+ ```python
463
+ from sentence_transformers import SentenceTransformer
464
+
465
+ # Download from the 🤗 Hub
466
+ model = SentenceTransformer("jimmydzj2006/snowflake-arctic-embed-xs_finetuned_aipolicy")
467
+ # Run inference
468
+ sentences = [
469
+ 'How can human subjects revoke their consent according to the suggested action?',
470
+ 'Action ID: MS-2.2-003\nSuggested Action: Provide human subjects with options to withdraw participation or revoke their\nconsent for present or future use of their data in GAI applications.\nGAI Risks: Data Privacy; Human-AI\nConfiguration; Information\nIntegrity',
471
+ 'Disinformation and misinformation – both of which may be facilitated by GAI – may erode public trust in true or valid evidence and information, with downstream effects. For example, a synthetic image of a Pentagon blast went viral and briefly caused a drop in the stock market. Generative AI models can also assist malicious actors in creating compelling imagery and propaganda to support disinformation campaigns, which may not be photorealistic, but could enable these campaigns to gain more reach and engagement on social media platforms. Additionally, generative AI models can assist malicious actors in creating fraudulent content intended to impersonate others.\n\n Trustworthy AI Characteristics: Accountable and Transparent, Safe, Valid and Reliable, Interpretable and Explainable\n\n 2.9. Information Security\n\n Information security for computer systems and data is a mature field with widely accepted and standardized practices for offensive and defensive cyber capabilities. GAI-based systems present two primary information security risks: GAI could potentially discover or enable new cybersecurity risks by lowering the barriers for or easing automated exercise of offensive capabilities; simultaneously, it expands the available attack surface, as GAI itself is vulnerable to attacks like prompt injection or data poisoning. \n\n Offensive cyber capabilities advanced by GAI systems may augment cybersecurity attacks such as hacking, malware, and phishing. Reports have indicated that LLMs are already able to discover some vulnerabilities in systems (hardware, software, data) and write code to exploit them. Sophisticated threat actors might further these risks by developing GAI-powered security co-pilots for use in several parts of the attack chain, including informing attackers on how to proactively evade threat detection and escalate privileges after gaining system access.\n\n Information security for GAI models and systems also includes maintaining availability of the GAI system and the integrity and (when applicable) the confidentiality of the GAI code, training data, and model weights. To identify and secure potential attack points in AI systems or specific components of the AI',
472
+ ]
473
+ embeddings = model.encode(sentences)
474
+ print(embeddings.shape)
475
+ # [3, 384]
476
+
477
+ # Get the similarity scores for the embeddings
478
+ similarities = model.similarity(embeddings, embeddings)
479
+ print(similarities.shape)
480
+ # [3, 3]
481
+ ```
482
+
483
+ <!--
484
+ ### Direct Usage (Transformers)
485
+
486
+ <details><summary>Click to see the direct usage in Transformers</summary>
487
+
488
+ </details>
489
+ -->
490
+
491
+ <!--
492
+ ### Downstream Usage (Sentence Transformers)
493
+
494
+ You can finetune this model on your own dataset.
495
+
496
+ <details><summary>Click to expand</summary>
497
+
498
+ </details>
499
+ -->
500
+
501
+ <!--
502
+ ### Out-of-Scope Use
503
+
504
+ *List how the model may foreseeably be misused and address what users ought not to do with the model.*
505
+ -->
506
+
507
+ ## Evaluation
508
+
509
+ ### Metrics
510
+
511
+ #### Information Retrieval
512
+
513
+ * Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator)
514
+
515
+ | Metric | Value |
516
+ |:--------------------|:-----------|
517
+ | cosine_accuracy@1 | 0.6484 |
518
+ | cosine_accuracy@3 | 0.7363 |
519
+ | cosine_accuracy@5 | 0.7802 |
520
+ | cosine_accuracy@10 | 0.8571 |
521
+ | cosine_precision@1 | 0.6484 |
522
+ | cosine_precision@3 | 0.2454 |
523
+ | cosine_precision@5 | 0.156 |
524
+ | cosine_precision@10 | 0.0857 |
525
+ | cosine_recall@1 | 0.6484 |
526
+ | cosine_recall@3 | 0.7363 |
527
+ | cosine_recall@5 | 0.7802 |
528
+ | cosine_recall@10 | 0.8571 |
529
+ | cosine_ndcg@10 | 0.7434 |
530
+ | cosine_mrr@10 | 0.7083 |
531
+ | **cosine_map@100** | **0.7158** |
532
+ | dot_accuracy@1 | 0.6484 |
533
+ | dot_accuracy@3 | 0.7363 |
534
+ | dot_accuracy@5 | 0.7802 |
535
+ | dot_accuracy@10 | 0.8571 |
536
+ | dot_precision@1 | 0.6484 |
537
+ | dot_precision@3 | 0.2454 |
538
+ | dot_precision@5 | 0.156 |
539
+ | dot_precision@10 | 0.0857 |
540
+ | dot_recall@1 | 0.6484 |
541
+ | dot_recall@3 | 0.7363 |
542
+ | dot_recall@5 | 0.7802 |
543
+ | dot_recall@10 | 0.8571 |
544
+ | dot_ndcg@10 | 0.7434 |
545
+ | dot_mrr@10 | 0.7083 |
546
+ | dot_map@100 | 0.7158 |
547
+
548
+ <!--
549
+ ## Bias, Risks and Limitations
550
+
551
+ *What are the known or foreseeable issues stemming from this model? You could also flag here known failure cases or weaknesses of the model.*
552
+ -->
553
+
554
+ <!--
555
+ ### Recommendations
556
+
557
+ *What are recommendations with respect to the foreseeable issues? For example, filtering explicit content.*
558
+ -->
559
+
560
+ ## Training Details
561
+
562
+ ### Training Dataset
563
+
564
+ #### Unnamed Dataset
565
+
566
+
567
+ * Size: 2,730 training samples
568
+ * Columns: <code>sentence_0</code> and <code>sentence_1</code>
569
+ * Approximate statistics based on the first 1000 samples:
570
+ | | sentence_0 | sentence_1 |
571
+ |:--------|:----------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------|
572
+ | type | string | string |
573
+ | details | <ul><li>min: 8 tokens</li><li>mean: 15.71 tokens</li><li>max: 33 tokens</li></ul> | <ul><li>min: 19 tokens</li><li>mean: 183.25 tokens</li><li>max: 467 tokens</li></ul> |
574
+ * Samples:
575
+ | sentence_0 | sentence_1 |
576
+ |:------------------------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
577
+ | <code>What is the Action ID associated with the suggested action?</code> | <code>Action ID: MS-2.12-004<br>Suggested Action: Verify effectiveness of carbon capture or offset programs for GAI training and<br>applications, and address green-washing concerns.<br>GAI Risks: Environmental</code> |
578
+ | <code>What is the suggested action regarding carbon capture or offset programs?</code> | <code>Action ID: MS-2.12-004<br>Suggested Action: Verify effectiveness of carbon capture or offset programs for GAI training and<br>applications, and address green-washing concerns.<br>GAI Risks: Environmental</code> |
579
+ | <code>What specific concerns should be addressed in relation to carbon capture programs?</code> | <code>Action ID: MS-2.12-004<br>Suggested Action: Verify effectiveness of carbon capture or offset programs for GAI training and<br>applications, and address green-washing concerns.<br>GAI Risks: Environmental</code> |
580
+ * Loss: [<code>MatryoshkaLoss</code>](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#matryoshkaloss) with these parameters:
581
+ ```json
582
+ {
583
+ "loss": "MultipleNegativesRankingLoss",
584
+ "matryoshka_dims": [
585
+ 284,
586
+ 256,
587
+ 128,
588
+ 64,
589
+ 32
590
+ ],
591
+ "matryoshka_weights": [
592
+ 1,
593
+ 1,
594
+ 1,
595
+ 1,
596
+ 1
597
+ ],
598
+ "n_dims_per_step": -1
599
+ }
600
+ ```
601
+
602
+ ### Training Hyperparameters
603
+ #### Non-Default Hyperparameters
604
+
605
+ - `eval_strategy`: steps
606
+ - `per_device_train_batch_size`: 16
607
+ - `per_device_eval_batch_size`: 16
608
+ - `num_train_epochs`: 10
609
+ - `multi_dataset_batch_sampler`: round_robin
610
+
611
+ #### All Hyperparameters
612
+ <details><summary>Click to expand</summary>
613
+
614
+ - `overwrite_output_dir`: False
615
+ - `do_predict`: False
616
+ - `eval_strategy`: steps
617
+ - `prediction_loss_only`: True
618
+ - `per_device_train_batch_size`: 16
619
+ - `per_device_eval_batch_size`: 16
620
+ - `per_gpu_train_batch_size`: None
621
+ - `per_gpu_eval_batch_size`: None
622
+ - `gradient_accumulation_steps`: 1
623
+ - `eval_accumulation_steps`: None
624
+ - `torch_empty_cache_steps`: None
625
+ - `learning_rate`: 5e-05
626
+ - `weight_decay`: 0.0
627
+ - `adam_beta1`: 0.9
628
+ - `adam_beta2`: 0.999
629
+ - `adam_epsilon`: 1e-08
630
+ - `max_grad_norm`: 1
631
+ - `num_train_epochs`: 10
632
+ - `max_steps`: -1
633
+ - `lr_scheduler_type`: linear
634
+ - `lr_scheduler_kwargs`: {}
635
+ - `warmup_ratio`: 0.0
636
+ - `warmup_steps`: 0
637
+ - `log_level`: passive
638
+ - `log_level_replica`: warning
639
+ - `log_on_each_node`: True
640
+ - `logging_nan_inf_filter`: True
641
+ - `save_safetensors`: True
642
+ - `save_on_each_node`: False
643
+ - `save_only_model`: False
644
+ - `restore_callback_states_from_checkpoint`: False
645
+ - `no_cuda`: False
646
+ - `use_cpu`: False
647
+ - `use_mps_device`: False
648
+ - `seed`: 42
649
+ - `data_seed`: None
650
+ - `jit_mode_eval`: False
651
+ - `use_ipex`: False
652
+ - `bf16`: False
653
+ - `fp16`: False
654
+ - `fp16_opt_level`: O1
655
+ - `half_precision_backend`: auto
656
+ - `bf16_full_eval`: False
657
+ - `fp16_full_eval`: False
658
+ - `tf32`: None
659
+ - `local_rank`: 0
660
+ - `ddp_backend`: None
661
+ - `tpu_num_cores`: None
662
+ - `tpu_metrics_debug`: False
663
+ - `debug`: []
664
+ - `dataloader_drop_last`: False
665
+ - `dataloader_num_workers`: 0
666
+ - `dataloader_prefetch_factor`: None
667
+ - `past_index`: -1
668
+ - `disable_tqdm`: False
669
+ - `remove_unused_columns`: True
670
+ - `label_names`: None
671
+ - `load_best_model_at_end`: False
672
+ - `ignore_data_skip`: False
673
+ - `fsdp`: []
674
+ - `fsdp_min_num_params`: 0
675
+ - `fsdp_config`: {'min_num_params': 0, 'xla': False, 'xla_fsdp_v2': False, 'xla_fsdp_grad_ckpt': False}
676
+ - `fsdp_transformer_layer_cls_to_wrap`: None
677
+ - `accelerator_config`: {'split_batches': False, 'dispatch_batches': None, 'even_batches': True, 'use_seedable_sampler': True, 'non_blocking': False, 'gradient_accumulation_kwargs': None}
678
+ - `deepspeed`: None
679
+ - `label_smoothing_factor`: 0.0
680
+ - `optim`: adamw_torch
681
+ - `optim_args`: None
682
+ - `adafactor`: False
683
+ - `group_by_length`: False
684
+ - `length_column_name`: length
685
+ - `ddp_find_unused_parameters`: None
686
+ - `ddp_bucket_cap_mb`: None
687
+ - `ddp_broadcast_buffers`: False
688
+ - `dataloader_pin_memory`: True
689
+ - `dataloader_persistent_workers`: False
690
+ - `skip_memory_metrics`: True
691
+ - `use_legacy_prediction_loop`: False
692
+ - `push_to_hub`: False
693
+ - `resume_from_checkpoint`: None
694
+ - `hub_model_id`: None
695
+ - `hub_strategy`: every_save
696
+ - `hub_private_repo`: False
697
+ - `hub_always_push`: False
698
+ - `gradient_checkpointing`: False
699
+ - `gradient_checkpointing_kwargs`: None
700
+ - `include_inputs_for_metrics`: False
701
+ - `eval_do_concat_batches`: True
702
+ - `fp16_backend`: auto
703
+ - `push_to_hub_model_id`: None
704
+ - `push_to_hub_organization`: None
705
+ - `mp_parameters`:
706
+ - `auto_find_batch_size`: False
707
+ - `full_determinism`: False
708
+ - `torchdynamo`: None
709
+ - `ray_scope`: last
710
+ - `ddp_timeout`: 1800
711
+ - `torch_compile`: False
712
+ - `torch_compile_backend`: None
713
+ - `torch_compile_mode`: None
714
+ - `dispatch_batches`: None
715
+ - `split_batches`: None
716
+ - `include_tokens_per_second`: False
717
+ - `include_num_input_tokens_seen`: False
718
+ - `neftune_noise_alpha`: None
719
+ - `optim_target_modules`: None
720
+ - `batch_eval_metrics`: False
721
+ - `eval_on_start`: False
722
+ - `eval_use_gather_object`: False
723
+ - `batch_sampler`: batch_sampler
724
+ - `multi_dataset_batch_sampler`: round_robin
725
+
726
+ </details>
727
+
728
+ ### Training Logs
729
+ | Epoch | Step | Training Loss | cosine_map@100 |
730
+ |:------:|:----:|:-------------:|:--------------:|
731
+ | 0.2924 | 50 | - | 0.5949 |
732
+ | 0.5848 | 100 | - | 0.6455 |
733
+ | 0.8772 | 150 | - | 0.6680 |
734
+ | 1.0 | 171 | - | 0.6721 |
735
+ | 1.1696 | 200 | - | 0.6811 |
736
+ | 1.4620 | 250 | - | 0.6850 |
737
+ | 1.7544 | 300 | - | 0.6959 |
738
+ | 2.0 | 342 | - | 0.7021 |
739
+ | 2.0468 | 350 | - | 0.7008 |
740
+ | 2.3392 | 400 | - | 0.7043 |
741
+ | 2.6316 | 450 | - | 0.7017 |
742
+ | 2.9240 | 500 | 5.9671 | 0.7018 |
743
+ | 3.0 | 513 | - | 0.7039 |
744
+ | 3.2164 | 550 | - | 0.7014 |
745
+ | 3.5088 | 600 | - | 0.7039 |
746
+ | 3.8012 | 650 | - | 0.7022 |
747
+ | 4.0 | 684 | - | 0.7058 |
748
+ | 4.0936 | 700 | - | 0.7039 |
749
+ | 4.3860 | 750 | - | 0.7061 |
750
+ | 4.6784 | 800 | - | 0.7030 |
751
+ | 4.9708 | 850 | - | 0.7073 |
752
+ | 5.0 | 855 | - | 0.7073 |
753
+ | 5.2632 | 900 | - | 0.7071 |
754
+ | 5.5556 | 950 | - | 0.7095 |
755
+ | 5.8480 | 1000 | 3.5897 | 0.7103 |
756
+ | 6.0 | 1026 | - | 0.7080 |
757
+ | 6.1404 | 1050 | - | 0.7075 |
758
+ | 6.4327 | 1100 | - | 0.7089 |
759
+ | 6.7251 | 1150 | - | 0.7087 |
760
+ | 7.0 | 1197 | - | 0.7102 |
761
+ | 7.0175 | 1200 | - | 0.7101 |
762
+ | 7.3099 | 1250 | - | 0.7134 |
763
+ | 7.6023 | 1300 | - | 0.7130 |
764
+ | 7.8947 | 1350 | - | 0.7133 |
765
+ | 8.0 | 1368 | - | 0.7142 |
766
+ | 8.1871 | 1400 | - | 0.7125 |
767
+ | 8.4795 | 1450 | - | 0.7163 |
768
+ | 8.7719 | 1500 | 3.0206 | 0.7124 |
769
+ | 9.0 | 1539 | - | 0.7144 |
770
+ | 9.0643 | 1550 | - | 0.7158 |
771
+ | 9.3567 | 1600 | - | 0.7159 |
772
+ | 9.6491 | 1650 | - | 0.7158 |
773
+ | 9.9415 | 1700 | - | 0.7158 |
774
+ | 10.0 | 1710 | - | 0.7158 |
775
+
776
+
777
+ ### Framework Versions
778
+ - Python: 3.11.9
779
+ - Sentence Transformers: 3.2.0
780
+ - Transformers: 4.44.1
781
+ - PyTorch: 2.4.0
782
+ - Accelerate: 0.34.2
783
+ - Datasets: 3.0.0
784
+ - Tokenizers: 0.19.1
785
+
786
+ ## Citation
787
+
788
+ ### BibTeX
789
+
790
+ #### Sentence Transformers
791
+ ```bibtex
792
+ @inproceedings{reimers-2019-sentence-bert,
793
+ title = "Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks",
794
+ author = "Reimers, Nils and Gurevych, Iryna",
795
+ booktitle = "Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing",
796
+ month = "11",
797
+ year = "2019",
798
+ publisher = "Association for Computational Linguistics",
799
+ url = "https://arxiv.org/abs/1908.10084",
800
+ }
801
+ ```
802
+
803
+ #### MatryoshkaLoss
804
+ ```bibtex
805
+ @misc{kusupati2024matryoshka,
806
+ title={Matryoshka Representation Learning},
807
+ author={Aditya Kusupati and Gantavya Bhatt and Aniket Rege and Matthew Wallingford and Aditya Sinha and Vivek Ramanujan and William Howard-Snyder and Kaifeng Chen and Sham Kakade and Prateek Jain and Ali Farhadi},
808
+ year={2024},
809
+ eprint={2205.13147},
810
+ archivePrefix={arXiv},
811
+ primaryClass={cs.LG}
812
+ }
813
+ ```
814
+
815
+ #### MultipleNegativesRankingLoss
816
+ ```bibtex
817
+ @misc{henderson2017efficient,
818
+ title={Efficient Natural Language Response Suggestion for Smart Reply},
819
+ author={Matthew Henderson and Rami Al-Rfou and Brian Strope and Yun-hsuan Sung and Laszlo Lukacs and Ruiqi Guo and Sanjiv Kumar and Balint Miklos and Ray Kurzweil},
820
+ year={2017},
821
+ eprint={1705.00652},
822
+ archivePrefix={arXiv},
823
+ primaryClass={cs.CL}
824
+ }
825
+ ```
826
+
827
+ <!--
828
+ ## Glossary
829
+
830
+ *Clearly define terms in order to be accessible across audiences.*
831
+ -->
832
+
833
+ <!--
834
+ ## Model Card Authors
835
+
836
+ *Lists the people who create the model card, providing recognition and accountability for the detailed work that goes into its construction.*
837
+ -->
838
+
839
+ <!--
840
+ ## Model Card Contact
841
+
842
+ *Provides a way for people who have updates to the Model Card, suggestions, or questions, to contact the Model Card authors.*
843
+ -->
config.json ADDED
@@ -0,0 +1,26 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "_name_or_path": "Snowflake/snowflake-arctic-embed-xs",
3
+ "architectures": [
4
+ "BertModel"
5
+ ],
6
+ "attention_probs_dropout_prob": 0.1,
7
+ "classifier_dropout": null,
8
+ "gradient_checkpointing": false,
9
+ "hidden_act": "gelu",
10
+ "hidden_dropout_prob": 0.1,
11
+ "hidden_size": 384,
12
+ "initializer_range": 0.02,
13
+ "intermediate_size": 1536,
14
+ "layer_norm_eps": 1e-12,
15
+ "max_position_embeddings": 512,
16
+ "model_type": "bert",
17
+ "num_attention_heads": 12,
18
+ "num_hidden_layers": 6,
19
+ "pad_token_id": 0,
20
+ "position_embedding_type": "absolute",
21
+ "torch_dtype": "float32",
22
+ "transformers_version": "4.44.1",
23
+ "type_vocab_size": 2,
24
+ "use_cache": true,
25
+ "vocab_size": 30522
26
+ }
config_sentence_transformers.json ADDED
@@ -0,0 +1,12 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "__version__": {
3
+ "sentence_transformers": "3.2.0",
4
+ "transformers": "4.44.1",
5
+ "pytorch": "2.4.0"
6
+ },
7
+ "prompts": {
8
+ "query": "Represent this sentence for searching relevant passages: "
9
+ },
10
+ "default_prompt_name": null,
11
+ "similarity_fn_name": null
12
+ }
model.safetensors ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:65ff04c91e23abe11a2471f64075652992e89b94026fcc034aa4ea091db513fa
3
+ size 90272656
modules.json ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [
2
+ {
3
+ "idx": 0,
4
+ "name": "0",
5
+ "path": "",
6
+ "type": "sentence_transformers.models.Transformer"
7
+ },
8
+ {
9
+ "idx": 1,
10
+ "name": "1",
11
+ "path": "1_Pooling",
12
+ "type": "sentence_transformers.models.Pooling"
13
+ },
14
+ {
15
+ "idx": 2,
16
+ "name": "2",
17
+ "path": "2_Normalize",
18
+ "type": "sentence_transformers.models.Normalize"
19
+ }
20
+ ]
sentence_bert_config.json ADDED
@@ -0,0 +1,4 @@
 
 
 
 
 
1
+ {
2
+ "max_seq_length": 512,
3
+ "do_lower_case": false
4
+ }
special_tokens_map.json ADDED
@@ -0,0 +1,37 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "cls_token": {
3
+ "content": "[CLS]",
4
+ "lstrip": false,
5
+ "normalized": false,
6
+ "rstrip": false,
7
+ "single_word": false
8
+ },
9
+ "mask_token": {
10
+ "content": "[MASK]",
11
+ "lstrip": false,
12
+ "normalized": false,
13
+ "rstrip": false,
14
+ "single_word": false
15
+ },
16
+ "pad_token": {
17
+ "content": "[PAD]",
18
+ "lstrip": false,
19
+ "normalized": false,
20
+ "rstrip": false,
21
+ "single_word": false
22
+ },
23
+ "sep_token": {
24
+ "content": "[SEP]",
25
+ "lstrip": false,
26
+ "normalized": false,
27
+ "rstrip": false,
28
+ "single_word": false
29
+ },
30
+ "unk_token": {
31
+ "content": "[UNK]",
32
+ "lstrip": false,
33
+ "normalized": false,
34
+ "rstrip": false,
35
+ "single_word": false
36
+ }
37
+ }
tokenizer.json ADDED
The diff for this file is too large to render. See raw diff
 
tokenizer_config.json ADDED
@@ -0,0 +1,64 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "added_tokens_decoder": {
3
+ "0": {
4
+ "content": "[PAD]",
5
+ "lstrip": false,
6
+ "normalized": false,
7
+ "rstrip": false,
8
+ "single_word": false,
9
+ "special": true
10
+ },
11
+ "100": {
12
+ "content": "[UNK]",
13
+ "lstrip": false,
14
+ "normalized": false,
15
+ "rstrip": false,
16
+ "single_word": false,
17
+ "special": true
18
+ },
19
+ "101": {
20
+ "content": "[CLS]",
21
+ "lstrip": false,
22
+ "normalized": false,
23
+ "rstrip": false,
24
+ "single_word": false,
25
+ "special": true
26
+ },
27
+ "102": {
28
+ "content": "[SEP]",
29
+ "lstrip": false,
30
+ "normalized": false,
31
+ "rstrip": false,
32
+ "single_word": false,
33
+ "special": true
34
+ },
35
+ "103": {
36
+ "content": "[MASK]",
37
+ "lstrip": false,
38
+ "normalized": false,
39
+ "rstrip": false,
40
+ "single_word": false,
41
+ "special": true
42
+ }
43
+ },
44
+ "clean_up_tokenization_spaces": true,
45
+ "cls_token": "[CLS]",
46
+ "do_basic_tokenize": true,
47
+ "do_lower_case": true,
48
+ "mask_token": "[MASK]",
49
+ "max_length": 512,
50
+ "model_max_length": 512,
51
+ "never_split": null,
52
+ "pad_to_multiple_of": null,
53
+ "pad_token": "[PAD]",
54
+ "pad_token_type_id": 0,
55
+ "padding_side": "right",
56
+ "sep_token": "[SEP]",
57
+ "stride": 0,
58
+ "strip_accents": null,
59
+ "tokenize_chinese_chars": true,
60
+ "tokenizer_class": "BertTokenizer",
61
+ "truncation_side": "right",
62
+ "truncation_strategy": "longest_first",
63
+ "unk_token": "[UNK]"
64
+ }
vocab.txt ADDED
The diff for this file is too large to render. See raw diff